Skip to content

Commit ef2939b

Browse files
author
iru
authored
Update README.md
1 parent cbe0c22 commit ef2939b

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

README.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -232,10 +232,6 @@ and a CodeBuild project being launched successfully
232232

233233
## Troubleshooting
234234

235-
## Q-Networking: What's the requirements for the inbound/outbound connection?
236-
A: Refer to [Sysdig SASS Region and IP Ranges Documentation](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges/) to get Sysdig SaaS endpoint and allow both outbound (for compute vulnerability report) and inbound (for scheduled compliance checkups)
237-
<br/>ECS type deployment will create following [security-group setup](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/modules/services/cloud-connector-ecs/sec-group.tf)
238-
239235
## Q-General: Need to modify cloud-connector config (to troubleshoot with `debug` loglevel, modify ingestors for testing, ...)
240236
A: both in ECS and AppRunner workload types, cloud-connector configuration is passed as a base64-encoded string through the env var `CONFIG`
241237
<br/>S: Get current value, decode it, edit the desired (ex.:`logging: debug` value), encode it again, and spin it again with this new definition.
@@ -249,14 +245,19 @@ with the correct values. Check [Sysdig SaaS per-region URLs if required](https:/
249245
### Q-General: I'm not able to see Cloud Infrastructure Entitlements Management (CIEM) results
250246
A: Make sure you installed both [cloud-bench](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-bench) and [cloud-connector](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-connector) modules
251247

248+
249+
## Q-General-Networking: What's the requirements for the inbound/outbound connection?
250+
A: Refer to [Sysdig SASS Region and IP Ranges Documentation](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges/) to get Sysdig SaaS endpoint and allow both outbound (for compute vulnerability report) and inbound (for scheduled compliance checkups)
251+
<br/>ECS type deployment will create following [security-group setup](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/modules/services/cloud-connector-ecs/sec-group.tf)
252+
252253
### Q-Scanning: I'm not seeing any image scanning results
253254
A: Need to check several steps
254255
<br/>S: First, image scanning is not activated by default. Ensure you have the [required scanning enablers](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#enabling-image-scanner) in place.
255256
<br/>Currently, images are scanned on registry/repository push events, and on the supported compute services on deployment. Make sure these events are triggered.
256257
<br/>Dig into secure for cloud compute log (cloud-connector) and check for errors.
257258
<br/>If previous logs are ok, check [spawned scanning service](http://localhost:1313/en/docs/sysdig-secure/sysdig-secure-for-cloud/#summary) logs
258259

259-
### Q-Scanning: Images pushed to Management Account ECR are not scanned
260+
### Q-AWS-Scanning: Images pushed to Management Account ECR are not scanned
260261
A: We don’t scan images from the management account ECR because is not a best practies to have an ECR in this account.
261262
</br>S: Following Role has to be created in the management account
262263
- Role Name: **OrganizationAccountAccessRole**

0 commit comments

Comments
 (0)